We provide IT Staff Augmentation Services!

Deployment Engineer Resume

2.00/5 (Submit Your Rating)

SUMMARY:

  • Senior systems engineer/ administration with 15 years of experience in Redhat/Ubuntu platforms. Worked on site at customer locations
  • Extensive experience in configuration, provisioning, patching, systems administration, migration/upgrade, performance tuning, automation and production support.
  • Cloud experience: Have been working with Softlayer Cloud with Confidential for the past two assignments with Confidential spanning the past 4 years.
  • Extensive scripting experience in Bash, Python and PHP
  • Strong customer services and technical troubleshooting experience, written many plugins to monitor system information, jobs completions, and system and application status. Also used Nagios to schedule OS updates to run as Nagios jobs. Recent experience running Nagios was with the HP/ Confidential /Phoenix project.
  • Installed configured and tested Openstack (Juno, Nova, Keystone, Cinder, Swift) POC Openstack
  • Configured and managed and deployed Openstack components such as keystone, nova, neutron, glance, swift by Mirantis Fuel.

TECHNICAL SKILLS:

Operating Systems: OpenSUSE (9.x,10.x,11.x Enterprise), Fedora (Core up to FC20), Red Hat (7.x,8.x,9.x) RHEL (3,4,5,6), CentOS (4,5,6), OEL (456), Windows (3.51, 2000, 2003, 2008, 2010), Mac OS X, Solaris (9,10), Novell Netware 2.15, 3.12, 4.x, OEL, VMware Server

Directory Services: OpenLDAP, Active Directory, Novell NDS

Application Servers: Apache, IIS, Tomcat, JBoss, Citrix NFuse, Citrix, Tarantella

Email\Groupware Servers: Sendmail, Postfix, Microsoft Exchange, GroupWise, CommuniGate Pro, EGroupware, Microsoft CRM

Database Servers: Postgres, MYSQL, Microsoft SQL, Oracle 9i

Network Monitoring: Nagios, Cacti, SNMP, HP Opsware, BMC Patrol, BMC Perform, Zenoss, Zabbix, Tivoli

Scripting / Programming: RPM creation, Bash, Python, Visual Basic, Turbo Pascal, Microsoft VBA, bashOther Proficiencies DNS, DHCP, DDNS, TCP/IP, VPN, SSH, SCP, RSYNC, BASH, SNMP, CRON, IMAP, POP3, SNMP, Snort, Scripting, PXE, Network Boot and Network installation, vi, sed, etc., spamassassin, clamAV, high availability, Samba, server clustering, Linux Network booting.

Package & Automation: RPM, Yast, Yum, Apt, HP Opsware. Confidential BigFix, puppet, Red Hat Satellite Server, Spacewalk Server, OpenStack

Version Control: Subversion

Hardware: Confidential Blade Centers, Dell, HP, Oracle Exalogic, Cisco UCS

Virtualization: QEMU, VMWare Server, VMWare ESX, Virtual Center

System Imaging: Symantec Ghost, Site Imager, G for U.

NAS / SAN Technologies: ISCSI, OCFS, GFS, EqualLogic, Snap Server, Multipath, Boot from SAN methods

Backup Solutions: Veritas NetBackup, Veritas BMR, Tivoli

Management systems: BMC Remedy

Message Brokers: Confidential MQ, Confidential Message Broker, Rabbit MQ

Cloud Services: Confidential Softlayer; Openstack

PROFESSIONAL EXPERIENCE:

Confidential

Deployment Engineer

Responsibilities:

  • Deployment Engineer for Mirantis Openstack on Redhat/Ubuntu platforms. Worked on site at customer locations such as ATT, Comcast, and others. Interfaced with customers to determine deployment requirements and implement as necessary.
  • Built, deployed and managed OpenStack Environment using Mirantis Fuel and experience working with Contrail, NFV, Vmware, Ansible, Linux, Nagios, Git, Jira.
  • Configured and managed and deployed Openstack components such as keystone, nova, neutron, glance, swift by Mirantis Fuel.
  • Linux (Ubuntu, CentOS, RHEL) networking & system administration

Confidential

Consultant

Responsibilities:

  • On site consultant to implement Confidential Manager at Confidential corporate headquarters. Short project, lasting only one (1) month. The scope of the project was to implement Confidential Manager for patching the over 1400 store servers and registers.
  • This project also included provisioning for datacenter servers.

Confidential

Linux Patching Engineer

Responsibilities:

  • Linux deployment and patch management. Responsible for patching RHEL, EOL, and Solaris servers.
  • This project had a rolling quarterly patch schedule of over 2200 servers. My role was to coordinate and schedule patch events with customer teams, create change tickets, and apply patches based on schedules established.
  • Installed configured and tested Openstack (Juno, Nova, Keystone, Cinder, Swift) POC Openstack and VMware.

Confidential

Linux Deployment, Patching, Automation and Support

Responsibilities:

  • Linux deployment and patch management, responsible for all Linux deployment and patch management for Confidential Government Services group. Worked to standardize infrastructure to Red Hat Linux. Worked with Oracle, Red Hat, Ubuntu, and Debian Linux distributions within the environment to ensure patching and deployment based on business needs.
  • Installed configured and tested Openstack (Juno, Nova, Keystone, Cinder, Swift) POC Openstack and VMware. Managed WMQ for dev teams. Ensure services are running, configure new MQ queue managers, and configure monitoring for WMQ instances.
  • Deployed Nagios to Monitoring approximately 700 systems (Windows, Linux, and Solaris) using both active and passive checks. Wrote numerous custom plugins to monitor specific application parameters as requested by the team leads. Custom notification groups and integration into the Unicenter helpdesk system.
  • Architected, installed, and configured a Spacewalk \ Puppet solution (the upstream open source version of Satellite server) to manage patching on various Linux distributions (CentOS, Confidential Linux, Red Hat, OEL Linux) and Solaris.

Confidential

Linux Administrator

Responsibilities:

  • Worked with Confidential of Canada to migrate recently acquired Algorithmics Linux environment to Confidential standard data - center. Responsibilities included both pre and post deployment activities, data collection, identify and implement client requirements in new data centers within a Red Hat 6 environment.
  • Deployed Nagios to monitor approximately 300 Linux systems. Wrote numerous custom plugins to monitor specific application parameters as requested by the team leads. This solution was a tool for migration and application deployment. The Nagios checks were geared toward confirming configuration items, software dependencies, and client requirements on application server pods.

Confidential

DevOps Linux Engineer

Responsibilities:

  • Supported development teams in Linux environments. Established monitoring Dev environments with Confidential TEM (Tivoli Endpoint Management) and Nagios. Supported LAMP stack, WebSphere, Tomcat, JBoss, and Oracle Databases. Some of the Dev environments were on Exalogic server. Minimal work with Puppet consulting with the deployment\automation team.
  • Administered Confidential WebSphere MQ, and message broker. Activities included installing Confidential WMB and WMQ, ensuring services were running, configured Nagios monitoring scripts to check the health of various WMQ or WMB instances.

Confidential

Responsibilities:

  • Member of the SOA deployment team.
  • Responsibilities included providing solutions to the SOA management team to meet Confidential and HIPPA standards for Linux infrastructure. This role was highly visible with Harris Technologies and the Confidential .
  • Provided written proposals and procedures to comply with Confidential, VA, and HIPPA standards.
  • Role also involved building servers, designing solutions to allow patching of systems that are isolated from the public internet through the use of Red Hat Satellite server or other methods depending on environment and level. Supported multiple hardware environments including Dell, HP, and Oracle Exalogic.
  • Implemented Nagios to monitor critical system as requirements dictate.

Confidential

UNIX Consultant

Responsibilities:

  • Responsibilities included building servers for multiple Confidential .
  • As a member of the build team, created processes to quickly deploy many Linux Servers simultaneously. Deployed physical machines and VMs on a regular basis.
  • Many of the systems deployed were boot from SAN in either Red Hat or Confidential Linux. On a few occasions also built Windows 2008 servers. Supported client on various hardware platforms including Exalogic. Traveled to remote offices of various Confidential to provide onsite support. ** This is a continuation of the Confidential contract when Confidential won the state contract.

Confidential

Responsibilities:

  • Member of the Confidential team (Distributed Network Operations Center). Responsible for 2nd shift operations. Responded to both internal and external customer requests/tickets. Other responsibilities included imaging and configuring simulator servers. Migrating “worlds” between servers and data centers. Regularly worked with various data center staff to address hardware issues, request reimages and reboots.

Confidential

Linux Consultant

Responsibilities:

  • Responsibilities included building servers for multiple Confidential . As a member of the build team, created processes to quickly deploy many Linux Servers simultaneously.
  • Deployed physical machines and VMs on a regular basis.
  • Many of the systems deployed were boot from SAN in either Red Hat or Confidential Linux.
  • On a few occasions, also built Windows 2008 servers.
  • Responsibilities also included traveling to remote offices of various Confidential to provide onsite support.

Confidential

Responsibilities:

  • Responsibilities included supporting the Confidential engineers as related to HP Hardware and Confidential Linux on production networks. Provided patch management, custom RPM's, and repository maintenance.
  • Designed Autoyast build process to cover various server roles on various enclaves in the network. Built a standalone CD and process to generate CD's on demand based upon the current Autoyast installation. This was useful when deploying to environments that were not connected to the Confidential network.
  • Develop Nagios plugins for HP client (Comcast) to monitor and report on the Comcast Zimbra mail system.
  • Engineered the Development environment for the Phoenix Project. Deployed an environment consisting of Confidential Linux 10.2 and 11, Oracle Unbreakable Linux, VMWare ESX 3.5 with VSphere and VMotion, and Red Hat Enterprise Linux 5. Created Autoyast and Kickstart processes for these environments. Implemented system monitoring via Nagios and Cacti, created various Nagios plugins to monitor VMware statistics. Responsible for firewall security, OpenVPN, and HA.

Remote Engineer

Confidential

Responsibilities:

  • Supported a development environment of Confidential Linux, WebSphere, ATG, HP Storage Works, Blade Systems, and LDAP

Onsite Consultant

Confidential, Eagan, MN and San Mateo, CA

Responsibilities:

  • Served as the interface between Confidential, HP, and Novell for various technical and management issues.
  • Worked closely with all levels of the Confidential engineering team to solve issues or satisfy requests as needed.
  • Escalated issues to level 3 HP support or to Novell directly.
  • Created and documented scripts, rpms, and procedures to be used by Confidential .
  • Engineered a process to merge the process of updating Opsware from the Novell SMT server.
  • Remotely support a standalone development environment located in Colorado Springs.

Confidential

Systems Engineer

Responsibilities:

  • Supported Linux/Oracle Manufacturing Environments. Acted as a project consultant to application teams recommending the appropriate Linux configuration or solution according to established Dell Standards.
  • On-call production support of Dell Manufacturing Systems. Script automated installs and configurations. Wrote configuration management scripts and processes to manage approximately 2000 servers. Served on the reliability engineering team.

Confidential

Solaris Systems Management

Responsibilities:

  • Provided day-to-day operational support of Solaris 9 and 10 servers. Updated existing documentation and provided “gap” support until full time employee is hired.

Confidential

Linux Admin / Disaster Recovery

Responsibilities:

  • Monitored and recovered Linux servers during a 96 hour disaster recovery tests. Followed up with documentation to improve the disaster recovery procedures.
  • Defined an automated server build process for development, disaster recovery, and production by combining Red Hat kickstart and external scripts to prepare servers to the desired configuration.

Confidential

IT Director

Responsibilities:

  • Responsible for developing, implementing, and supporting solutions to meet the company’s business goals.
  • Provided support for the existing production environment of approximately 70 servers.
  • Standardized the environment to a single Linux distribution ( Confidential 10.1). Standardized the development environment to Confidential 10.1 with Tomcat and Eclipse. Implemented an opensource groupware solution (EGroupware).
  • Optimized the Nagios monitors to be “intelligent” in the way it sends alerts by creating shell scripts to query systems via SNMP, DNS, etc. Built a second data center with 2 Confidential Blade Centers (17 LS20's) running Confidential 10.1, JBoss, Apache, etc. connected to an ISCSI EqualLogic SAN.
  • Implemented openHA high availability. Created a method of applying SVN version control Linux configuration and deployment.

Confidential

Owner / President

Responsibilities:

  • Confidential was a technology service provider servicing clients with enterprise level technology support and solutions nationwide. Responsible for planning and executing projects for many clients on a broad range of technologies including Microsoft, Red Hat, Confidential, Citrix, Tarantella, Apple, Communigate, MS-SQL, WatchGuard, Cisco, and Oracle. Managed up to nine (9) engineers running multiple projects simultaneously for a wide variety of customers.

We'd love your feedback!